• Title/Summary/Keyword: Wireless Location

Search Result 1,174, Processing Time 0.029 seconds

Authentication Protocol Of The Read Only RFID Tag Using Partial ID (부분 ID를 이용한 읽기전용 RFID태그 인증프로토콜)

  • Li, Yong-Zhen;Jeong, Yonn-Su;Seo, Dong-Il;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.595-600
    • /
    • 2006
  • Nowadays, low-cost radio frequency identification (RFID) technique, is recognizable without the physical contact between the reader and the tag, has been attracting more and more interests from both industry and academic institutes. however, it causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. The security problem of read only tag can be only solved by physical method. In this paper, we propose a low-cost authentication protocol which can be adopted for read-only RFID tag using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping and spoofing attacking so that avoiding the location privacy exposure

Development of LBS Terminal Standard Platform based on WIPI (위피 기반 LBS 단말 표준 플랫폼 개발)

  • Jang, Jeong-Ah;Choi, Hai-Ock;Kim, Kyong-Ho
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.309-316
    • /
    • 2007
  • This paper describes the LBS Terminal Standard Platform based on WIPI. The LBS Terminal Standard Platform based on WIPI is API for obtaining the location information in the mobile standard platform providing the environment which is mounted on the mobile communications terminal and can platform an application. The mobile Platform consists of HAL API, C API and Java API that it is able to process Location Information data among wireless network. It is defined and developed at the HAL sections and C sections based on Generic I/O, and It describes in details in this paper. This standard Platform is expected to be utilized as the base specification in developing the LBS Terminal development technology and standard method to LBS application developers.

A Study on the Characteristics of Methods for Experiencing Contents and Network Technologies in the Exhibition space applied with Location Based Service - Focus on T.um as the Public Exhibition Center for a Telecommunication Company - (위치기반서비스(LBS) 적용 전시관의 콘텐츠 체험방식과 기술특성에 관한 연구 - 이동통신 기업홍보관 티움(T.um)을 중심으로 -)

  • Yi, Joo-Hyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.5
    • /
    • pp.173-181
    • /
    • 2010
  • Opened on November 2008, as the public exhibition center of a telecommunication company, T.um is dedicated for delivering the future ubiquitous technologies and business vision of the company leading domestic mobile communication business to the global expected clients and business partners. Since the public opening, not only over 18,000 audiences in 112 nations have been visiting T.um, but also the public media have been releasing news regarding the ubiquitous museum constantly. By the reasons, T.um is regarded as a successful case for public exhibition centers. The most distinguished quality of the museum is established by the Location Based Service technology in the initial construction stage. A visitor in anyplace of T.um can be detected by digital devices equipped GPS systems. The LBS system in T.um allows visitors to get the information of relevant technologies as well as the process of how to operating each content at his own spots by smart phone of which wireless network systems make it possible. This study is focusing on analyzing and defining the T.um special qualities in terms of technologies to provide the basic data for following exhibition space projects based on LBS. The special method of experiencing contents can be designed by utilizing the network system applied to T.um in the planning stage.

Algorithm for Adjusting Cluster Size according to Location Information in WSN (무선 센서네트워크에서 센서노드의 위치 정보를 이용한 클러스터 크기 조정 알고리즘)

  • Kwak, Tae-Kil;Jin, Kyo-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.389-392
    • /
    • 2007
  • In this paper, we propose an algorithm that improve network lifetime by adjusting cluster size according to location information of sensor node in wireless sensor network (WSN) using clustering technique. The sensed information in each cluster transfers to sink node through inter-cluster communications. Cluster head (CH) that nearby located in sink node much more spend own energy than far away CHs, because nearer CH forwards more data, so network lifetime is decreased. Proposed algorithm minimizes energy consumption in adjacent cluster to sink node by decreasing cluster site, and improve CH lifetime by distributing transmission paths. As a result of analysis, the proposed algorithm shows longer network lifetime in WSN.

  • PDF

A Study on Improved Split Algorithms for Moving Object Trajectories in Limited Storage Space (한정된 저장 공간상에서 이동 객체 궤적들에 대한 개선된 분할 알고리즘에 관한 연구)

  • Park, Ju-Hyun;Cho, Woo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2057-2064
    • /
    • 2010
  • With the development of wireless network technology, the location information of a spatiotemporal object which changes their location is used in various application. Each spatiotemporal object has many location information, hence it is inefficient to search all trajectory information of spatiotemporal objects for a range query. In this paper, we propose an efficient method which divides a trajectory and stores its division data on restricted storage space. Using suboptimal split algorithm, an extended split algorithm that minimizes the volume of EMBRs(Extended Minimum Bounding Box) is designed and simulated. Our experimental evaluation confirms the effectiveness and efficiency of our proposed splitting policy

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Location Estimation Algorithm based on AOA in Indoor Environment (실내 환경에서의 AOA 기반 위치 추정 알고리즘)

  • Jung, Yong-jin;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.863-865
    • /
    • 2015
  • A method for estimating position is AOA, TOA, TDOA, Wi-Fi, Beacon etc. A method for estimating the location in indoor environment is used mainly Wi-Fi, Beacon. The reason is that AOA, TOA and TDOA are unfit to estimate position in indoor environment. To address this problem, this paper presents a AOA algorithm based on AP having a four directional antenna. The algorithm uses only the angle received from the four antennas. This can draw linear equations for signal. And calculate the intersections of the lines. Intersections means the position of user.

  • PDF

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

Location based Ad-hoc Network Routing Protocol for Ubiquitous Port (지능형 항만을 위한 위치기반 Ad-hoc 네트워크 라우팅 프로토콜)

  • Lee, Bong-Hee;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.65-71
    • /
    • 2011
  • In this paper, the RFID / USN-based ad-hoc network structure is presented for efficient operation of a container terminal yard. Communication between fixed or mobile devices in the container terminal yard is accomplished through the ad-hoc node, to collect the status information of a container in real time. Any outside shipper of the container as well as central server allows to share the status information of a container through ad-hoc communication. In addition, to predict the maximum wireless transmission range of nodes by RFID tag position in the yard, LAODV (Location based AODV) routing protocol is proposed. The validity is proved by performance evaluation via computer simulation.

The Method for Recommend of Contact Area According to the User's SLA(S-RCA) based on a Moving Path Prediction Service (이용자의 과거 위치 정보와 이용자별 SLA(Sevice Level Agreement)를 지원하는 동적 예측서비스 기반의 접촉 지역 추천(S-RCA) 기법)

  • Cho, Kyeong Rae;Lee, Jee Hyong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.41-54
    • /
    • 2013
  • In this paper, We collected location based services of the user's past moving paths through the GPS. Using the collected by location-based services through the analysis of the similarity between the user's of service level agreement recommended of mobile contact area(SLA) proposed that can be. S-RCA method based on Service Level Agreement of the users in order to provide the service user's path distance, time, and to predict the direction of the movement paths and collect. The data collected by the interests and requirements of users through classification with the same interests and the needs of users to move between the analysis of the similarity between the path is used to analyze the results of analysis of the path-specific tolerance range (distance, time, and space) is determined according to the difference in the contact area. From a small area of the error range for users first to recommended and through their smartphones recommended contact area (S-RCA) to meet with the other party to make a choice of recommended methods. We verify through experiments that proposed method(S-RCA) a valid and reliable mobile contact area were recommended.